twister

HTTP fault injector for testing
Log | Files | Refs | README | LICENSE

commit cf03dc5c417743237edf492521a88eadb11b66ed
parent 7d8f5aa36b99f53cc0d2fa9e799c0a296bf9b3c3
Author: Marcello Stanisci <stanisci.m@gmail.com>
Date:   Fri,  7 Jun 2019 14:59:41 +0200

Revert last change.

No need to add any ad-hoc header, since the Twister
echoes all the headers it gets from the client connection
(including Authorization!).

Diffstat:
Mconfigure.ac | 7-------
Msrc/twister/taler-twister-service.c | 12------------
2 files changed, 0 insertions(+), 19 deletions(-)

diff --git a/configure.ac b/configure.ac @@ -424,13 +424,6 @@ AC_ARG_ENABLE([[doc]], test "x$enable_doc" = "xno" || enable_doc=yes AM_CONDITIONAL([ENABLE_DOC], [test "x$enable_doc" = "xyes"]) -# Check if --enable-apikey-sandbox was given. - -AC_MSG_CHECKING([whether all requests will have a apikey sandbox header]) -AC_ARG_ENABLE([apikey_sandbox], - [AS_HELP_STRING([--enable-apikey-sandbox], [Adds a "Autorization: ApiKey sandbox" header to requests])], - [AC_DEFINE(APIKEY_SANDBOX, , [Adds a "Autorization: ApiKey sandbox" header to requests])], - []) else diff --git a/src/twister/taler-twister-service.c b/src/twister/taler-twister-service.c @@ -1575,12 +1575,9 @@ create_response (void *cls, curl_easy_setopt (hr->curl, CURLOPT_INFILESIZE, hr->io_len); - - /* This works _response_ headers out. */ curl_easy_setopt (hr->curl, CURLOPT_HEADERFUNCTION, &curl_check_hdr); - curl_easy_setopt (hr->curl, CURLOPT_HEADERDATA, hr); @@ -1727,19 +1724,10 @@ create_response (void *cls, return MHD_NO; } - /** - * This works _request_ headers out. - */ MHD_get_connection_values (con, MHD_HEADER_KIND, &con_val_iter, hr); - #ifdef APIKEY_SANDBOX - GNUNET_assert - (NULL != curl_slist_append - (hr->headers, - "Authorization: ApiKey sandbox"); - #endif curl_easy_setopt (hr->curl, CURLOPT_HTTPHEADER,